Chrome Extension
WeChat Mini Program
Use on ChatGLM

MLSPD - Machine Learning Based Spam and Phishing Detection

Computational Social Networks (CSoNet)(2018)

Faculty of Information Technology

Cited 10|Views26
Abstract
Spam emails have become a global menace since the rise of the Internet era. In fact, according to an estimate, around 50% of the emails are spam emails. Spam emails as part of a phishing scam can be sent to the masses with the motive to perform information stealing, identity theft, and other malicious actions. The previous studies showed that 91% of the cyber attacks start with the phishing emails, which contain Uniform Resource Locator (URLs). Although these URLs have several characteristics which make them distinguishable from the usual website links, yet a human eye cannot easily notice these URLs. Previous research also showed that traditional systems such as blacklisting/whitelisting of IPs and spam filters could not efficiently detect phishing and spam emails. However, Machine Learning (ML) approaches have shown promising results in combating spamming and phishing attacks. To identify these threats, we used several ML algorithms to train spam and phishing detector. The proposed framework is based on several linguistic and URL based features. Our proposed model can detect the spam and phishing emails with the accuracy of 89.2% and 97.7%, respectively.
More
Translated text
Key words
Artificial Intelligence,Phishing,Spam emails,Supervised learning
PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Try using models to generate summary,it takes about 60s
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Related Papers

Deep in the Dark: A Novel Threat Detection System Using Darknet Traffic.

2019 IEEE International Conference on Big Data (Big Data) 2019

被引用14

Machine LearningTechniquesfor Detection of Website Phishing: A Review for Promises and Challenges

2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) 2021

被引用23

Feature Selections for the Classification of Webpages to Detect Phishing Attacks: A Survey

2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2020

被引用17

Machine Learning in Policing Counterfeit Websites

Lekha Khobrekar, Qurratulain Munshi, Swapna Naik
International Research Journal of Innovations in Engineering and Technology 2022

被引用0

Phishing URL Detection by Leveraging RoBERTa for Feature Extraction and LSTM for Classification

2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS) 2023

被引用1

Enhancement of Accuracy and Performance of Machine Learning System During Detection of Phishing Emails

Pallavi Sharma,Rohit Kumar, Shelly Kalsi
Lecture Notes in Electrical Engineering Emergent Converging Technologies and Biomedical Systems 2023

被引用0

Performing Multiclass Classification on UNSW-NB15 Dataset by Applying Machine Learning Approach on Intrusion Detection System

Avinash Kumar,Anita Soni, Manmohan Singh
Data-Intensive Research Data Science and Big Data Analytics 2024

被引用0

Defending Characteristics and Attribution Analysis for Phishing Attacks

Ali Al-Sinayyid,Md Jultiker Ali Jewel, Venkatesh Mannuni, Kadiyala Sasidhar
2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023 2023

被引用0

Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper
GPU is busy, summary generation fails
Rerequest